Information security

340 views

Published on

This presentation will give a brief idea about information security and ethical hacking. It also shows the need of security now-a-days where cyber crime is increasing day-by-day.

Published in: Education
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
340
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
18
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Information security

  1. 1. By :– Vinmit Patel
  2. 2. InformationSecurity
  3. 3. IntroductionInformation security is the practice ofdefending information from unauthorizedaccess, use, disclosure, disruption,modification, perusal, inspection,recording or destruction.
  4. 4. IntelligenceKnowledgeInformationData
  5. 5. Richard’s Law Of ComputerSecurityEither don’t buy a computer systemand if you are buying a computersystem don’t turn it on.
  6. 6. Basic Principle of Security C - Confidentiality I - Integrity A - Availability
  7. 7. ConfidentialityConfidentiality refers to preventing the disclosure ofinformation to unauthorized individuals or systems.IntegrityIn information security, data integrity meansmaintaining and assuring the accuracy and consistencyof data over its entire life-cycle.AvailabilityFor any information system to serve its purpose, theinformation must be available when it is needed.
  8. 8. • Authentication• AuthorizationConfidentiality• AccountabilityIntegrity
  9. 9. CryptographyIt is an art of secret writing in whichplain text is converted into ciphertext(not readable) by usingmathematical induction process
  10. 10. Types of CryptographyOn the basis of Cipher text1. stream line cipher2. Block (chunk)cipherOn the basis of Secret Key1. Single key Cryptography Standard2. Public key Cryptography Standard
  11. 11. SteganographyTo hide an information behind animage is called steganographyThis technique was used in 26/11attack
  12. 12. Ethical Hacking
  13. 13. IntroductionHacking is neither legal nor illegal it is just aconcept to bypass a security mechanism of anysystem , server or any network withauthentication and authorization or withoutauthentication and authorization.
  14. 14. Types Of Hacker1. White hat/ Ethical hackers2. Black hat hackers/ Crackers3. Grey hat hackers4. Blue hat hackersAdditional category1. Neophyte2. Hacktivist3. Elite hacker4. Script kiddie
  15. 15. White hat / Ethical hacker• If someone is bypassing security or breachingsecurity with authentication and authorization iscalled ethical hacker• A white hat hacker breaks security for non-malicious reasons, perhaps to test their ownsecurity system or while working for a securitycompany which makes security software. Theterm "white hat" in Internet slang refers to anethical hacker.
  16. 16. Black hat hackerA "black hat" hacker is a hacker who "violates computersecurity for little reason beyond maliciousness or forpersonal gain"They choose their targets using a two-pronged processknown as the "pre-hacking stage".
  17. 17. Blue hat hackerA blue hat hacker is someone outside computersecurity consulting firms who is used to bug test asystem prior to its launch, looking for exploits sothey can be closed. Microsoft also uses the termBlue Hat to represent a series of security briefingevents.
  18. 18. Grey hat hackerA grey hat hacker is a combination of a Black Hatand a White Hat Hacker. A Grey Hat Hacker maysurf the internet and hack into a computer systemfor the sole purpose of notifying the administratorthat their system has been hacked, for example.Then they may offer to repair their system for asmall fee.[
  19. 19. Basic TechniquesVulnerability scannerPassword crackingPacket snifferSpoofing attackRootkitSocial engineeringTrojan horsesVirusesWormsKey loggers
  20. 20. Thank You

×